作者
Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka
发表日期
2011/4/25
期刊
IEEE Transactions on Information Forensics and Security
卷号
6
期号
3
页码范围
650-660
出版商
IEEE
简介
We consider secret key agreement based on radio propagation characteristics in a two-way relaying system where two legitimate parties named Alice and Bob communicate with each other via a trusted relay. In this system, Alice and Bob share secret keys generated from measured radio propagation characteristics with the help of the relay in the presence of an eavesdropper. We present four secret key agreement schemes: an amplify-and-forward (AF) scheme, a signal-combining amplify-and-forward (SC-AF) scheme, a multiple-access amplify-and-forward (MA-AF) scheme, and an amplify-and-forward with artificial noise (AF with AN) scheme. In these schemes, the basic idea is to share the effective fading coefficients between Alice and Bob and use them as the source of the secret keys. The AF scheme is based on a conventional amplify-and-forward two-way relaying method, whereas in the SC-AF scheme and …
引用总数
2012201320142015201620172018201920202021202220231591061114109723
学术搜索中的文章
T Shimizu, H Iwai, H Sasaoka - IEEE Transactions on Information Forensics and …, 2011